Sciweavers

4714 search results - page 262 / 943
» Cognitive Packet Networks
Sort
View
151
Voted
JSAC
2008
114views more  JSAC 2008»
15 years 4 months ago
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad Hoc Networks with Rational Nodes
Nodes in an ad hoc wireless network incur certain costs for forwarding packets since packet forwarding consumes the resources of the nodes. If the nodes are rational, free packet f...
N. Ram Suri, Y. Narahari
ICUMT
2009
15 years 2 months ago
A theoretical model for opportunistic routing in ad hoc networks
Traditional routing strategies for multi-hop wireless networks forward packets by selecting at the sender side the next hop for each packet. Recently, such a paradigm has been call...
Angela Sara Cacciapuoti, Marcello Caleffi, Luigi P...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 11 months ago
TCP Dynamics in 802.11 Wireless Local Area Networks
— In 802.11 wireless links with disabled MAC retries, data and ACK packets within a TCP session collide resulting in packet losses. We show in this paper that in this situation, ...
Sumathi Gopal, Sanjoy Paul
164
Voted
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 6 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu